Thus, we might argue that within a
computer system, a clock provides a basic support mechanism for emulating the
emotional mechanisms of the human mind.
An additional useful concept derived from
a clock, from a trustworthiness standpoint, is the maintenance of a continuous
time-stamp; an absolute timing indicator that can be coordinated with the world
outside the transcendent personal device. Through this mechanism, the time of
occurrence of transactions can be linked to the passage of time in that outside
world. On large scale systems, clocks are often synchronized to standard time
indicators transmitted by the U.S. Naval Observatory. In extreme cases, clock
facilities that are synchronized to vibrational models of specific atoms
provide extremely accurate interval timing. Obviously, any synchronization with
the external world would require both the internal and external domains to be
encompassed by a common trust infrastructure.
Communication from the outside world into
today’s secure cores benefits, from a security standpoint, from being simple.
In actuality, the relatively low speed channel into current secure cores is attractive
from the standpoint of insuring the internal security of the device.
Unfortunately, this single, low speed channel greatly diminishes the
effectiveness of the device in projecting the presence of the transcendent
personal device bearer into the variety of policy environments in which it
could be most effective in enhancing the capabilities of the bearer to meet her
or his individual needs. Consequently, we see great advantage in a two phase
facility for input and output within the transcendent personal device; a
multi-sensory system facility with the outside world and the device body and a
more direct descendant of the current, simple channel between the body and the
trusted core agent.
As we’ve previously noted, the physical
basis for communication channels within and among computers always derives from
signals sent via the electromagnetic spectrum. Some channels utilize electrical
signals sent along solid conductors such as copper or gold wire (we call these contact
channels) while other channels are effected through radio frequency signals
transmitted between one computer and another (we call these contactless
channels). Contact channels typically have the characteristic of allowing
higher data rate transmission to be established with a minimum of equipment
relative to radio frequency based channels. Contact channels also tend to be
easier to sequester in some fashion so as to prevent, or at least strongly
limit, eavesdropping of the channel. Contactless channels have the
characteristic of allowing effective communication without requiring physical collocation.
This means that the transcendent personal device can remain firmly in the
possession of its bearer at all times, thus establishing a guard against many
types of attack. Of course, such radio frequency based channels are difficult,
if not impossible, to shield from eavesdroppers unless they are simply shut
down. Consequently, cryptographic protocols are required to render the channels
private in the face of such eavesdroppers. The transcendent personal
device would benefit from having both classes of connectivity to the outside
world. Such a variety of input and output facilities would allow the
transcendent personal device to interconnect with virtually any policy
infrastructure that its bearer would be likely to encounter during daily life.
Perhaps, this is an appropriate point to interject a more speculative
technological development.
Neural research is making tremendous
inroads into the capability to monitor and in some instance affect the operational
characteristics of neural network structures within the brain. Micro connectors
provide facilities to establish direct electro-chemical connectivity to
collections of neurons. One might anticipate that in the future, perhaps even
the relatively near future, nanotechnological components might allow connection
to very small collections of neurons; perhaps even to individual neurons.
Moreover, should this connectivity come to pass it would
|